Reference no: EM133152302 , Length: 20 pages
MN603 Wireless Networks and Security - Melbourne Institute of Technology
Assessment - Wireless networks analysis, challenges, techniques and recommendations
Purpose: The purpose of the assignment is to implement wireless networks in Simulation environment and analyse the routing protocols, evaluate them in terms of security, QoS, and energy efficiency. Students will be able to complete the following ULOs:
a. Analyse and compare wireless communication protocols;
b. Apply and evaluate wireless network security techniques with consideration of ethical implications;
c. Design and implement secure enterprise wireless networks
Assignment Description
Tasks:
There are two parts to this assignment, i.e., part A and part B.
A. Write a group report on one of the following topics listed in Part A. Your tutor will allocate you a group number (maximum of five students in a group) and your topic. (65 Marks)
B. Demonstration. Make a group video demonstration of three wireless security tools.
Topic 1 - Wireless Security: Challenges, Approaches and Future Trends
Increasingly, organisation's are using wireless technology for vital communications they want to keep private, such as mobile e-commerce transactions, email, and corporate data transmissions. The open communications environment makes wireless transmissions more exposed than wired communications to malicious attacks. Write a research survey of the Wireless Security challenges and analyze their most recent solutions and developments. Your article should cover the following points:
• Background of the Wireless security
• Describe the security requirements of wireless networks, including their authenticity, confidentiality, integrity, and availability issues.
• Overview of security attacks encountered in wireless networks.
• The contrast between wireless usage and security standards.
• Challenges involved in wireless communications.
• Overview of security issues, i.e., attacks, vulnerabilities, and threats in wireless networks
• Provide a survey of the existing security protocols and algorithms that are adopted in the existing wireless network standards, such as the Bluetooth, Wi-Fi, WiMAX, and the long-term evolution (LTE) systems.
• Make a comparison among WEP and WPA and WPA2 as all wireless security protocols in Wi-Fi technology.
• Compare wireless security techniques
• Discuss the security approaches for the various wireless technologies.
Topic 2 - IoT Network: Challenges, Security Threats and approaches
In recent years, the development of the Internet of Things technology has been very rapid. However, with the explosive growth of IoT devices, the challenges facing the IoT environment are becoming more and more serious. How to ensure the security of the IoT becomes a key issue. Write a research survey of the IoT network challenges and analyze their most recent solutions and developments. Your article should cover the following points:
• Background of the IoT security.
• Overview of IoT application domains and discusses the most important wireless IoT protocols
• Describe the security requirements of IoT networks, including their authenticity, confidentiality, integrity, and availability issues.
• Overview of security attacks encountered in IoT networks.
• Discuss the security issues in IoT applications.
• Review the threat challenges and IoT security models at each level of the Internet of Things
• Overview of security issues, i.e., attacks, vulnerabilities, and threats in IoT networks.
• Provide a comprehensive security analysis of the IoT, by examining and assessing the potential threats and countermeasures.
• Provide the recommendations to improve the IoT infrastructure.
Instructions:
Prepare your article as below
1. Complete the assignment (minimum 6 and maximum 19 pages) including all the sections below. The number of words will be counted thoroughly and you must keep the minimum number of words to avoid any penalties.
• Title (maximum 15 words)
• Abstract (200 - 250 words)
• Introduction (800 - 2000 words)
• Literature Review (1000 - 4000 words)
• Main body (1000 - 3000 words)
• Conclusion (200 - 300 words)
• Future Works (150 - 300 words)
• References (minimum 10 references)
2. The article must be a ‘Review'1 article, including at least 5 references and not more than 25.
3. Strictly follow the IEEE reference format for in-body citations and the references section.
4. See the attached files for guidance on how to prepare a review paper. You can also find thorough instructions from IEEE and the Internet.
Part B description: Make a group video demonstration of three wireless security tools such as Kismet, Reaver, InSSIder and SolarWinds WiFi network analyzer. Prepare slides (between 8 - 12 slides) for your video demonstration. As a team of five, create a 5-8 minutes video demo using the Zoom application (along with the presenters' video) addressing the following tasks:
1. Analyse and discuss the importance of your selected wireless security tools
2. Perform three selected wireless security tools
3. Identify and discuss the strengths and weaknesses of each wireless security tools
4. Which wireless security would you recommend? Justify your recommendation
Attachment:- Wireless Networks and Security.rar